US20120023327A1 - Information processing apparatus - Google Patents
Information processing apparatus Download PDFInfo
- Publication number
- US20120023327A1 US20120023327A1 US13/185,923 US201113185923A US2012023327A1 US 20120023327 A1 US20120023327 A1 US 20120023327A1 US 201113185923 A US201113185923 A US 201113185923A US 2012023327 A1 US2012023327 A1 US 2012023327A1
- Authority
- US
- United States
- Prior art keywords
- signing request
- type
- type certificate
- certificate signing
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 49
- 238000000034 method Methods 0.000 claims description 43
- 238000004590 computer program Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 38
- 230000006870 function Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000007639 printing Methods 0.000 description 5
- 238000001193 catalytic steam reforming Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Definitions
- the invention relates to an information processing apparatus that prepares a certificate signing request.
- Patent Document 1 discloses a client apparatus that makes out a certificate signing request (CSR) including an extended area (hereinafter referred to as “extensions”) in accordance with version 3 of the x509 format.
- CSR certificate signing request
- extensions extended area
- a certificate authority makes out the electronic certificate including the extensions based on the certificate signing request prepared by the client apparatus.
- Illustrative aspects of exemplary embodiments of the present invention provide a technology which enables a user to easily acquire one of a certificate signing request including extensions and a certificate signing request not including extensions.
- FIG. 1 shows an example of an information processing system according to a first exemplary embodiment of the invention
- FIG. 2 shows an example of a CSR preparing process
- FIG. 3 shows an example of a CSR preparation screen
- FIG. 4 shows an example of a CSR selection screen
- FIG. 5 shows an example of memory contents of a VRAM and an NVRAM
- FIG. 6 shows a flow chart of a CSR preparing process according to a second exemplary embodiment
- FIG. 7 shows an example of memory contents of a VRAM and an NVRAM
- FIG. 8 shows a flow chart of a CSR preparing process and a CSR acquiring process of a third exemplary embodiment
- FIG. 9 shows a flow chart of a CSR deleting process
- FIG. 10 shows an example of memory contents of a VRAM and an NVRAM.
- illustrative aspects of exemplary embodiments of the present invention provide a technology which enables a user to easily acquire one of a certificate signing request including extensions and a certificate signing request not including extensions.
- an information processing apparatus comprising: an acquiring unit that is configured to acquire specific information; a preparation unit that is configured to make out a certificate signing request based on the specific information, wherein the preparation unit is configured to make out a first type certificate signing request including extensions and to make out a second type certificate signing request not including extensions; a display control unit that is configured to display a selection screen on a display unit; and an output unit that is configured to output one of the first type certificate signing request and the second type certificate request to an outside accoding to selecting by a user in the selection screen.
- the information processing apparatus outputs one of the first and second type certificate signing requests according to a user's selection on the selection screen. Therefore, the user can select one of the first and second type certificate signing requests according to the selection screen, thereby easily acquiring one of the first and second type certificate signing requests.
- the selection screen is a screen that allows the user to select one of a first type certificate authority and a second type certificate authority that is different from the first type certificate authority, wherein when the user selects the first type certificate authority in the selection screen, the output unit outputs the first type certificate signing request, and wherein when the user selects the second type certificate authority in the selection screen, the output unit outputs the second type certificate signing request.
- the user can select the first or second type certificate signing request.
- the user can select one of the first and second type certificate signing requests based on the certificate authority that should make out a certificate.
- the user can easily image the options. Even if the user does not have sufficient knowledge about a difference between the first and second type certificate signing requests, the user can appropriately select one of the first and second type certificate signing requests.
- the preparation unit makes out both the first type certificate signing request and the second type certificate signing request based on the specific information
- the display control unit displays the selection screen on the display unit after the preparation unit makes out both the first type certificate signing request and the second type certificate signing request.
- the information processing apparatus can output the first or second type certificate signing request that is selected by the user. Therefore, compared to a configuration in which a user selects one of the first and second type certificate signing requests and then the one certificate signing request is made out and output, it is possible to shorten a time period from the user selection to the output of the certificate signing request.
- the preparation unit makes out both the first type certificate signing request and the second type certificate signing request in a memory, and wherein the preparation unit is configured to: delete the second type certificate signing request from the memory when the user selects for the first type certificate singing request in the selection screen; and delete the first type certificate signing request from the memory when the user selects for the second type certificate singing request in the selection screen.
- the information processing apparatus can quickly delete the non-selected first or second certificate signing request of the prepared first and second certificate signing requests from the memory.
- the preparation unit makes out both the first type certificate signing request and the second type certificate signing request in a memory, and wherein the preparation unit is configured to delete the first type and second type certificate signing requests from the memory when a first certificate, which is made out based on the first type certificate signing request, or a second certificate, which is made out based on the second type certificate signing request, is installed into the information processing apparatus.
- the information processing apparatus does not delete the first and second type certificate signing requests until the first or second certificate is installed in the information processing apparatus. Therefore, when a certificate authority does not make out a certificate based on the one certificate signing request that is selected according to the selection screen and the user wants the certificate authority to make out a certificate based on the other certificate signing request, for example, the user can acquire the other certificate signing request from the information processing apparatus without enabling the information processing apparatus to re-prepare the other certificate signing request.
- the preparation unit is configured to: make out the first type certificate signing request without making out the second type certificate signing request when the user selects for the first type certificate signing request in the selection screen; and make out the second type certificate signing request without making out the first type certificate signing request when the user selects for the second type certificate signing request in the selection screen.
- the information processing apparatus makes out only one certificate signing request that is selected by the user.
- the information processing apparatus does not have to prepare a certificate signing request that is not selected by the user.
- it is possible to reduce the resource burden of the information processing apparatus for example, burden of the preparing process and burden of the memory).
- the preparation unit is further configured to: when the user selects for the first type certificate signing request, make out a first secret key and a first public key and make out the first type certificate signing request including the first public key; and when the user selects for the second type certificate singing request, make out a second secret key and a second public key and make out the second type certificate signing request including the second public key.
- the information processing apparatus further comprises a memory control unit that is configured to: associate and store a first certificate and the first secret key in the memory when the first certificate, which is made out based on the first type certificate signing request, is installed in the information processing apparatus; and associate and store a second certificate and the second secret key in the memory when the second certificate, which is made out based on the second type certificate signing request, is installed in the information processing apparatus.
- the information processing apparatus can use the installed certificate to communicate with another device.
- the preparation unit is configured to: delete the second secret key from the memory, when the first certificate is installed in the information processing apparatus; and delete the first secret key from the memory, when the first certificate is installed in the information processing apparatus.
- a control method for the above-described information processing apparatus a method of preparing a certificate signing request, a computer program for the above-described information processing apparatus and a non-transitory computer-readable medium which stores the computer program are also novel and useful.
- an information processing system 1 includes a LAN 4 , an Internet 6 , a multi-function device 10 (a peripheral apparatus of a terminal apparatus 60 ), a terminal apparatus 60 and certificate authorities 70 , 80 .
- the multi-function device 10 , the terminal apparatus 60 and the certificate authority 70 are connected to the LAN 4 .
- the multi-function device 10 , the terminal apparatus 60 and the certificate authority 70 can communicate with each other via the LAN 4 .
- the LAN 4 and the certificate authority 80 are connected to the Internet 6 .
- the terminal apparatus 60 and the certificate authority 80 can communicate with each other via the LAN 4 and the Internet 6 .
- the multi-function device 10 includes a printing function, a scanner function, a copier function, an IPFAX function, electronic mail transmitting and receiving functions and the like.
- the multi-function device 10 includes a display unit 12 , an operation unit 14 , a network interface 16 , a scan execution unit 18 , a printing execution unit 20 and a control unit 22 .
- the respective units 12 to 22 are connected to a bus line 24 .
- the display unit 12 is a display for displaying a variety of information.
- the operation unit 14 has a plurality of keys. A user can operate the operation unit 14 to input various instructions to the multi-function device 10 .
- the network interface 16 is connected to the LAN 4 .
- the scan execution unit 18 has a scan mechanism such as CIS, CCD and the like and scans a scan target to generate image data.
- the printing execution unit 20 has a printing mechanism of an inkjet head manner, a laser manner and the like and performs a printing operation in response to an instruction from the control unit 22 .
- the control unit 22 includes a CPU 30 and a memory 32 .
- the memory 32 includes a ROM 34 , a VRAM (volatile memory) 36 and an NVRAM (non-volatile memory) 38 .
- the ROM 34 stores therein a program 35 .
- the CPU 30 executes a process in accordance with the program 35 in the ROM 34 .
- the CPU 30 executes a process in accordance with the program 35 so as to implement the functions of respective units 40 , 42 , 44 , 46 and 48 .
- the terminal apparatus 60 is a personal computer and the like, for example.
- the terminal apparatus 60 is connected to the LAN 4 .
- the terminal apparatus 60 includes a display unit 62 , an operation unit 64 , a network interface 65 and a control unit 66 .
- the respective units are connected to a bus line 61 .
- the display unit 62 is a display for displaying a variety of information.
- the operation unit 64 includes a keyboard, a mouse, and the like.
- the network interface 65 is connected to the LAN 4 .
- the control unit 66 includes a CPU 67 and a memory 68 .
- the certificate authorities 70 , 80 are authorities that make out a certificate in response to a certificate signing request (hereinafter, referred to as ‘CSR’) made by the multi-function device 10 .
- the CSR is classified into: a first type CSR including a basic area and extensions; and a second type CSR that includes a basic area but does not include extensions.
- a first type CSR including a basic area and extensions and a second type CSR that includes a basic area but does not include extensions.
- basic area information various information of a certificate user such as common name, organization, department, city, province, country and the like.
- the first CSR is a CSR for making out a certificate of version 3 of an x509 format (hereinafter, referred to as ‘CSR of x509v3’), for example.
- the second type CSR is a CSR for making out a certificate of version 1 of the x509 format (hereinafter, referred to as ‘CSR of x509v1’), for example.
- the certificate authority 70 makes out a certificate including extensions based on the first type CSR including extensions.
- the certificate authority 70 can make out a certificate not including extensions based on the second type CSR that does not include extensions.
- the certificate authority 80 can make out a certificate not including extensions based on the second type CSR, but the certificate authority 80 cannot make out a certificate based on the first type CSR including the extensions.
- the certificate authority 70 and the certificate authority 80 having the above characteristics are sometimes referred to as ‘Private certificate authority 70 ’ and ‘Public certificate authority 80 ’, respectively.
- the Private certificate authority means an authority that can make out a certificate, only based on a CSR that the multi-function device 10 prepares in accordance with an application of the multi-function device 10 .
- the Public certificate authority 80 means an enterprise, a public institution and the like that makes out a certificate.
- the IPv4 address is adopted as an IP address.
- the IP address is not limited to the IPv4 address.
- an IPv6 address may be adopted.
- a user can use the operation unit 64 of the terminal apparatus 60 to access the web server installed on the multi-function device 10 .
- a display control unit 44 (refer to FIG. 1 ) transmits data, which indicates the certificate setting screen, to the terminal apparatus 60 .
- the terminal apparatus 60 displays the certificate setting screen on the display unit 62 .
- the certificate setting screen is a screen for making a variety of settings relating to a certificate.
- the certificate setting screen has a first hyperlink for displaying a CSR preparation screen (refer to FIG. 3 ) and a second hyperlink screen for displaying an install screen (not shown).
- the user can use the operation unit 64 to operate the first hyperlink, thereby performing an operation for displaying the CSR preparation screen (refer to FIG. 3 ).
- the user can use the operation unit 64 to operate the second hyperlink, thereby performing an operation for displaying the install screen.
- the install screen is a screen that enables the user to perform an install operation for installing a certificate acquired from the certificate authority in the multi-function device 10 , which will be described later.
- the display control unit 44 transmits data, which indicates a CSR preparation screen 100 (refer to FIG. 3 ), to the terminal apparatus 60 .
- the CSR preparation screen 100 is displayed on the display unit 62 of the terminal apparatus 60 (S 2 in FIG. 2 ).
- the CSR preparation screen 100 includes an input unit 102 , a selection unit 104 and an OK button 106 .
- the input unit 102 has input columns 102 a to 102 f of each information of common name, organization, department, city, province and country.
- the information that should be input in the input columns 102 a to 102 f is the basic area information.
- the selection unit 104 has radio buttons 104 a, 104 b and an input column 104 c.
- the radio button 104 a (automatic) is a button for selecting that the IPv4 address of the multi-function device 10 will be used as a subject alternative name (SubjectAltName) that can be included in extensions.
- the radio button 104 b (manual) is a button for selecting that a character string input in the input column 104 c will be used as an alias name of a certificate.
- the user can check any one of the radio buttons 104 a, 104 b.
- the user can operate the operation unit 64 to input specific information in the input columns 102 a to 102 f, to check any one of the radio button 104 a, 104 b and to operate the OK button 106 .
- the control unit 66 of the terminal apparatus 60 transmits the basic area information, which is input in the input columns 102 a to 102 f, the check information, which indicates that any one of the radio buttons 104 a, 104 b is checked, and the character string, which is input in the input column 104 c, to the multi-function device 10 .
- An acquiring unit 40 monitors whether the information transmitted from the terminal apparatus 60 is received (S 4 ).
- the acquiring unit 40 receives and acquires the information from the terminal apparatus 60 , wherein the information includes the basic area information, the check information and the character string input in the input column 104 c.
- a preparation unit 42 makes out a key pair for a first type CSR (S 6 ). Specifically, in S 6 , the preparation unit 42 makes out a first public key that should be included in a first type CSR and a first secret key that corresponds to the first public key.
- the preparation unit 42 makes out a first type CSR by using the basic area information, the check information, the character string input in the input column 104 c and the first public key (S 8 ). Specifically, in S 8 , the preparation unit 42 prepares a basic area including the basic area information and the first public key. In addition, the preparation unit 42 acquires information that should be included in extensions from the program 35 .
- the preparation unit 42 further acquires, as the item name of the information that should be included in extensions, the ‘subject alternative name (SubjectAltName)’ from the program 35 and acquires as the item content, the character string input in the input column 114 c .
- the preparation unit 42 makes out extensions including the acquired information.
- the information that should be included in the extensions is not limited to the subject alternative name (SubjectAltName).
- the information that should be included in the extensions may include the extended key usage (ExtendedKeyUsage) and the like.
- the information that should be included in the extensions may include the other information, instead of including the subject alternative name (SubjectAltName).
- the selection unit 104 of the extensions setting of the CSR preparation screen 100 may be provided with the other check column or input column in addition to the respective columns 104 a to 104 c or instead of the respective columns 104 a to 104 c.
- the information that should be included in the extensions may any one of a preset value that is acquired from the program 35 and a value that is set by a user.
- the information that should be included in the extensions is generated by the information that is input from the CSR preparation screen 100 by the CSR preparing process and the information that is acquired from the program 35 .
- the preparation unit 42 makes out a first type CSR by combining the prepared basic area information and extensions. When the preparation unit 42 makes out the first type CSR, the preparation unit 42 saves the first type CSR and the first secret key in the VRAM 36 (S 10 ).
- the preparation unit 42 makes out a key pair for a second type CSR (S 12 ). Specifically, the preparation unit 42 makes out a second public key and a second secret key. Then, the preparation unit 42 makes out a second type CSR by using the basic area information and the second public key (S 14 ). Specifically, in S 14 , the preparation unit 42 makes out a basic area including the basic area information and the second public key, thereby preparing a second type CSR. As described above, the second type CSR does not include extensions.
- the preparation unit 42 stores the second type CSR and the second secret key in the VRAM 36 (S 16 ). Accordingly, at this time, as shown in FIG.
- the VRAM 36 stores information, in which the first type CSR and the first secret key are associated with each other, and information, in which the second type CSR and the second secret key are associated with each other. Then, the display control unit 44 transmits data, which indicates a CSR selection screen 110 (refer to FIG. 4) , to the terminal apparatus 60 . As a result, the CSR selection screen 110 is displayed on the display unit 62 of the terminal apparatus 60 (S 18 in FIG. 2 ).
- the CSR selection screen 110 includes: a message to prompt the user to select a certificate authority; a radio button 112 for selecting the Public certificate authority 80 (refer to FIG. 1 ); a radio button 114 for selecting the Private certificate authority 70 (refer to FIG. 1 ); and an OK button 116 .
- the user can use the operation unit 64 to check one of the radio buttons 112 , 114 and to operate the OK button 116 .
- the radio button 112 it means that the user selects, as a certificate authority for preparing a certificate by using a CSR, the Public certificate authority 80 . In other words, it means that the user selects the preparation of the second type CSR.
- the user checks the radio button 114 it means that the user selects, as a certificate authority for preparing a certificate by using a CSR, the Private certificate authority 70 .
- the Private certificate authority 70 can make out a certificate based on both the first type CSR and the second type CSR.
- the user checks the radio button 114 it means that the user selects the first type CSR.
- the user can select any one of the Public certificate authority 80 and the Private certificate authority 70 in accordance with the CSR selection screen 110 , thereby selecting any one of the first type CSR and the second type CSR.
- the control unit 66 of the terminal apparatus 60 transmits the selection result of the user to the multi-function device 10 .
- the user can select any one of the first type CSR and the second type CSR based on the certificate authority that should prepare a certificate.
- the user can easily image the options. Even when the user does not have sufficient knowledge about a difference between the first and second type CSRs, the user can appropriately select one of the first and second type CSRs.
- the preparation unit 42 determines whether the user selects the first type CSR (S 20 ). Specifically, when the selection result from the terminal apparatus 60 indicates the Private certificate authority 70 , the preparation unit 42 determines YES in S 20 . On the other hand, when the selection result from the terminal apparatus 60 indicates the Public certificate authority 80 , the preparation unit 42 determines NO in S 20 . When a result of the determination in S 20 is YES, the preparation unit 42 stores the first secret key, which is stored in the VRAM 36 , in the NVRAM 38 . Further, the preparation unit 42 deletes the first secret key from the VRAM 36 (S 21 ). Then, the preparation unit 42 deletes the second type CSR and the second secret key from the VRAM 36 (S 22 ).
- the multi-function device 10 can rapidly delete the second type CSR and the second secret key from the VRAM 34 .
- the VRAM 36 stores the first type CSR.
- the NVRAM 38 stores the first secret key.
- an output unit 46 transmits the first type CSR in the VRAM 36 to the terminal apparatus 60 .
- the first type CSR is displayed on the display unit 62 (S 24 ).
- the user can confirm the content of the first type CSR.
- the control unit 66 saves the first type CSR, which is displayed on the display unit 62 , in the memory 68 of the terminal apparatus 60 .
- the preparation unit 42 stores the second secret key, which is stored in the VRAM 36 , in the NVRAM 38 . Further, the preparation unit 42 deletes the second secret key from the VRAM 36 (S 25 ). Then, the preparation unit 42 deletes the first type CSR and the first secret key from the VRAM 36 (S 26 ). According to this configuration, the multi-function device 10 can rapidly delete the first type CSR and the first secret key from the VRAM 36 . Then, the output unit 46 transmits the second type CSR in the VRAM 36 to the terminal apparatus 60 . As a result, the second type CSR is displayed on the display unit 62 (S 28 ). The user can confirm the content of the second type CSR. When the user uses the operation unit 64 to perform a predetermined operation, the control unit 66 saves the second type CSR, which is displayed on the display unit 62 , in the memory 68 of the terminal apparatus 60 .
- the multi-function device 10 can immediately transmit the first or second type CSR.
- the corresponding one CSR is prepared and output, it is possible to shorten a time period from the user selection to the transmission of the CSR.
- a memory control unit 48 deletes the first or second CSR, which has been transmitted to the terminal apparatus 60 in S 24 or S 28 , from the VRAM 36 .
- the user can use the operation unit 64 of the terminal apparatus 60 to perform an operation for designating a certificate authority.
- the terminal apparatus 60 transmits the CSR acquired from the multi-function device 10 (CSR that is saved in the memory 68 ) to a certificate authority that is designated by the user.
- the Private certificate authority 70 when the Private certificate authority 70 receives the first type CSR from the terminal apparatus 60 , the Private certificate authority 70 makes out a first certificate including extensions based on the first type CSR and transmits the first certificate to the terminal apparatus 60 .
- the Public certificate authority 80 when the Public certificate authority 80 receives the second type CSR from the terminal apparatus 60 , the Public certificate authority 80 makes out a second certificate not including extensions based on the second type CSR and transmits the second certificate to the terminal apparatus 60 .
- the user selects the Public certificate authority 80 even though the first type CSR is acquired, the Public certificate authority 80 cannot make out a certificate based on the first type CSR. In this case, the terminal apparatus 60 cannot obtain a certificate.
- the terminal apparatus 60 When the terminal apparatus 60 receives the first certificate from the Private certificate authority 70 , the terminal apparatus 60 stores the first certificate in the memory 68 . Then, as described above, the user can use the operation unit 64 of the terminal apparatus 60 to execute an operation for displaying the install screen (not shown). When an operation for displaying the install screen is executed, the display control unit 44 transmits data, which indicates the install screen, to the terminal apparatus 60 . As a result the install screen is displayed on the display unit 62 of the terminal apparatus 60 . The user can use the operation unit 64 of the terminal apparatus 60 to execute an install operation for installing the first certificate stored in the memory 68 into the NVRAM 38 of the multi-function device 10 , in the install screen.
- the control unit 66 of the terminal apparatus 60 transmits the first certificate to the multi-function device 10 .
- the memory control unit 48 of the multi-function device 10 associates and stores (installs) the first certificate and the first secret key in the NVRAM 38 .
- the terminal apparatus 60 receives the second certificate from the Public certificate authority 80 , the terminal apparatus 60 transmits the second certificate to the multi-function device 10 .
- the memory control unit 48 of the multi-function device 10 associates and stores (installs) the second certificate and the second secret key in the NVRAM 38 .
- the multi-function device 10 can use the installed certificate to communicate with another device (not shown).
- the CSR selection screen 110 shown in FIG. 4 enables the user to select one of the first and second type CSRs.
- the output unit 46 transmits the first type CSR to the terminal apparatus 60 (S 30 ).
- the output unit 46 transmits the second type CSR to the terminal apparatus 60 (S 30 ). Accordingly, the user executes the operation of selecting one of the first type CSR and the second type CSR in accordance with the CSR selection screen 110 , thereby easily acquiring the CSR.
- the multi-function device 10 is one example of the ‘information processing apparatus.’
- the CSR selection screen 110 of FIG. 4 is one example of the ‘selection screen.’
- the display unit 62 of the terminal apparatus 60 is one example of the ‘display unit.’
- the result YES in S 20 of FIG. 2 and the result NO in S 20 are examples of the ‘first case’ and the ‘second case’, respectively.
- the Private certificate authority 70 and the Public certificate authority 80 are examples of the ‘first type certificate authority’ and the ‘second type certificate authority’, respectively.
- the basic area information that is acquired in S 4 of FIG. 2 , the information that should be included in the extensions and is acquired from the program 35 in S 8 of FIG. 2 and the character string that is input in the input column 104 c (refer to FIG. 3 ) and is acquired in S 4 of FIG. 2 are examples of the ‘specific information.’
- a second exemplary embodiment of the present invention will be described. Incidentally, a detailed description common to the first exemplary embodiment will be omitted.
- S 40 and S 42 of FIG. 6 are the same as S 2 and S 4 of FIGS. 2 .
- S 44 and S 46 of FIG. 6 are the same as S 18 and S 20 of FIG. 2 .
- the preparation unit 42 makes out a key pair for the first type CSR (S 48 ).
- the preparation unit 42 makes out the first type CSR (S 50 ).
- the first type CSR and the first secret key are prepared in the VRAM 36 .
- the preparation unit 42 stores the first secret key, which is stored in the, VRAM 36 , in the NVRAM 38 (S 52 ).
- the preparation unit 42 further deletes the first secret key from the VRAM 36 .
- the VRAM 36 stores the first type CSR.
- the NVRAM 38 stores the first secret key.
- the output unit 46 transmits the first type CSR to the terminal apparatus 60 .
- the first type CSR is displayed on the display unit 62 (S 54 ).
- the preparation unit 42 makes out a key pair for the second type CSR (S 56 ) and makes out the second type CSR (S 58 ). Then, the preparation unit 42 stores the second secret key in the NVRAM 38 (S 60 ). Then, the output unit 46 transmits the second type CSR to the terminal apparatus 60 . As a result, the second type CSR is displayed on the display unit 62 (S 62 ).
- the process of the multi-function device 10 after the CSR preparing process is completed is the substantially same as the first exemplary embodiment. Accordingly, when the first type CSR is transmitted in S 54 of FIG. 6 , the memory control unit 48 deletes the first type CSR from the VRAM 36 as shown in FIG. 7( b ). Like the first exemplary embodiment, the user can make a request for certificate preparation to acquire the first certificate, which is prepared on the basis of the first type CSR, or the second certificate, which is prepared on the basis of the second type CSR, so as to install the first certificate or the second certificate in the multi-function device 10 . As shown in FIG. 7( c ), for example, when the install operation of the first certificate is executed, the memory control unit 48 of the multi-function device 10 associates and stores the first certificate and the first secret key in the NVRAM 38 .
- the multi-function device 10 makes out only one type CSR that is selected by the user.
- the multi-function device 10 does not have to prepare a CSR that is not selected by the user.
- the resource processing burden of the multi-function device 10 for example, burden of the preparation processing and the burden of the memory.
- the result YES in S 46 of FIG. 6 and the result NO in S 46 are examples of the ‘first case’ and the ‘second case’, respectively.
- the control unit 22 executes processes of S 70 to S 84 of FIG. 8 .
- the processes of S 70 to S 84 are the substantially same as S 2 to S 16 of FIG. 2 .
- the preparation unit 42 saves the first type CSR and the first secret key in the NVRAM 38 , differently from S 10 of FIG. 2 .
- the preparation unit 42 saves the second type CSR and the second secret key in the NVRAM 38 , differently from S 16 of FIG. 2 .
- the NVRAM 38 stores the information in which the first type CSR and the first secret key are associated with each other and the information in which the second type CSR and the second secret key are associated with each other.
- the user makes a request for certificate preparation to acquire the first certificate, which is prepared on the basis of the first type CSR, or the second certificate, which is prepared on the basis of the second type CSR, so as to install the first certificate or the second certificate in the multi-function device 10 .
- the NVRAM 38 stores the first certificate, the first type CSR, the first secret key, the second type CSR and the second secret key.
- the memory control unit 48 (refer to FIG. 1 ) specifies a public key that is included in the installed certificate (S 100 ). Then, the memory control unit 48 determines whether the secret key corresponding to the public key specified in S 100 (hereinafter, referred to as ‘specific secret key’) is in the NVRAM 38 (S 102 ). When the specific secret key is in the NVRAM 38 (YES in S 102 ), the memory control unit 48 determines whether the specific secret key is associated with the first type CSR (S 104 ). For example, when the specific secret key is the first secret key, the memory control unit determines YES in S 104 . When the specific secret key is the second secret key, the memory control unit determines NO in S 104 .
- the preparation unit 42 deletes the second type CSR and the second secret key from the NVRAM 38 (S 106 ). Then, the preparation wait 42 deletes the first type CSR from the NVRAM 38 (S 108 ).
- the memory control unit 48 associates and stores the installed certificate (i.e., first certificate) and the first secret key in the NVRAM 38 . Accordingly, at the completion time of S 108 , the NVRAM 38 stores therein the first certificate and the first secret key with being associated with each other as shown in FIG. 10( c ).
- the preparation unit 42 deletes the first type CSR and the first secret key from the NVRAM 38 (S 110 ). Then, the preparation unit 42 deletes the second type CSR from the NVRAM 38 (S 112 ).
- the memory control unit 48 associates and stores the installed certificate (i.e., second certificate) and the second secret key in the NVRAM 38 .
- the display control unit 44 transmits data, which indicates a screen showing that the install of the certificate has been completed, to the terminal apparatus 60 (S 114 ). Thereby, the user can know that the install of the certificate has been completed.
- the step of S 114 is completed, the CSR deleting process is ended.
- the display control unit 44 transmits data, which indicates a screen showing an error, to the terminal apparatus 60 (S 116 ).
- the step of S 116 is completed, the CSR deleting process is ended.
- the preparation unit 42 stores the information in which the first type CSR and the first secret key are associated with each other and the information in which the second type CSR and the second secret key are associated with each other in the NVRAM 38 .
- the multi-function device 10 does not delete the first and second type CSRs until the first or second certificate is installed in the multi-function device 10 .
- the user will acquire the first type CSR from the multi-function device 10 and erroneously transmit the first type CSR to the Public certificate authority 80 .
- the Public certificate authority 80 cannot make out a certificate based on the first type CSR.
- the certificate setting screen further includes a third hyperlink for displaying the CSR selection screen (refer to FIG. 4 ). Accordingly, in the above situation, the user can use the operation unit 64 of the terminal apparatus 60 to operate the third hyperlink in the certificate setting screen, thereby executing the operation for displaying the CSR selection screen (refer to FIG. 4 ).
- the control unit 66 of the terminal apparatus 60 transmits a predetermined command to the multi-function device 10 .
- the control unit 22 of the multi-function device 10 performs the same processes as S 86 to S 92 of FIG. 8 .
- the display control unit 44 transmits the data, which indicates the CSR selection screen 110 (refer to FIG. 4 ), to the terminal apparatus 60 .
- the CSR selection screen 110 (refer to FIG. 4 ) is displayed on the display unit 62 of the terminal apparatus 60 (S 86 in FIG. 8 ).
- the user can select the second type CSR (i.e., ‘Public’) in accordance with the CSR selection screen 110 (refer to FIG. 4 ), so that the user can acquire the second type CSR.
- the second type CSR i.e., ‘Public’
- the user can acquire the second type CSR from the multi-function device 10 without requiring the multi-function device 10 to prepare the second type CSR again.
- the result YES in S 88 of FIG. 8 and the result NO in S 88 are examples of the ‘ first case’ and the ‘second case’, respectively.
- a CSR of x509v3 including extensions may be the first type CSR, and a CSR of x509v3 including no information in extensions may be the second type CSR.
- the output of the first type or second type CSR may be performed by an arbitrary method without being limited to the download to the memory of the terminal apparatus 60 .
- the displayed CSR information may be designated by the user, and a content thereof may be copied and pasted to a text file so as to be saved.
- the certificate authority 70 may be configured such that the certificate authority 70 is unable to prepare a certificate based on the second type CSR.
- the ‘first type certificate authority’ may be a certificate authority that can make out a certificate at least based on the first type CSR.
- the ‘second type certificate authority’ may be a certificate authority that cannot make out a certificate based on the first type CSR and can prepare a certificate based on the second type CSR.
- the respective information may be displayed on the display unit 12 of the multi-function device 10 .
- the display unit 12 of the multi-function device 10 is an example of the ‘display unit.’
- the multi-function device 10 has been exemplified.
- a PC a server a printer, a scanner, a mobile terminal (PDA, mobile phone and the like) may be used.
- PDA mobile phone and the like
- Each of the devices is included in the configuration of the ‘information processing system.’
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Facsimiles In General (AREA)
Abstract
Description
- This application claims priority from Japanese Patent Application No. 2010-164825 filed on Jul. 22, 2010, the entire subject matter of which is incorporated herein by reference.
- The invention relates to an information processing apparatus that prepares a certificate signing request.
- There has been disclosed a technology relating to an electronic certificate of an x509 format that is used in communication such as SSL (Secure Socket Layer), TLS (Transport Layer Security) and the like. In particular, Patent Document 1 discloses a client apparatus that makes out a certificate signing request (CSR) including an extended area (hereinafter referred to as “extensions”) in accordance with version 3 of the x509 format. A certificate authority makes out the electronic certificate including the extensions based on the certificate signing request prepared by the client apparatus.
- Illustrative aspects of exemplary embodiments of the present invention provide a technology which enables a user to easily acquire one of a certificate signing request including extensions and a certificate signing request not including extensions.
-
FIG. 1 shows an example of an information processing system according to a first exemplary embodiment of the invention; -
FIG. 2 shows an example of a CSR preparing process; -
FIG. 3 shows an example of a CSR preparation screen; -
FIG. 4 shows an example of a CSR selection screen; -
FIG. 5 shows an example of memory contents of a VRAM and an NVRAM; -
FIG. 6 shows a flow chart of a CSR preparing process according to a second exemplary embodiment; -
FIG. 7 shows an example of memory contents of a VRAM and an NVRAM; -
FIG. 8 shows a flow chart of a CSR preparing process and a CSR acquiring process of a third exemplary embodiment; -
FIG. 9 shows a flow chart of a CSR deleting process; and -
FIG. 10 shows an example of memory contents of a VRAM and an NVRAM. - However, there is a certificate authority that cannot make out an electronic certificate based on a certificate singing request including extensions. Accordingly, when a user wants the corresponding certificate authority to make out an electronic certificate, the user is required to enable a client apparatus to prepare a certificate signing request not including extensions.
- Therefore, illustrative aspects of exemplary embodiments of the present invention provide a technology which enables a user to easily acquire one of a certificate signing request including extensions and a certificate signing request not including extensions.
- According to one illustrative aspect of the invention, there is provided an information processing apparatus comprising: an acquiring unit that is configured to acquire specific information; a preparation unit that is configured to make out a certificate signing request based on the specific information, wherein the preparation unit is configured to make out a first type certificate signing request including extensions and to make out a second type certificate signing request not including extensions; a display control unit that is configured to display a selection screen on a display unit; and an output unit that is configured to output one of the first type certificate signing request and the second type certificate request to an outside accoding to selecting by a user in the selection screen.
- According thereto, the information processing apparatus outputs one of the first and second type certificate signing requests according to a user's selection on the selection screen. Therefore, the user can select one of the first and second type certificate signing requests according to the selection screen, thereby easily acquiring one of the first and second type certificate signing requests.
- According to another illustrative aspect of the invention, in the information processing apparatus, the selection screen is a screen that allows the user to select one of a first type certificate authority and a second type certificate authority that is different from the first type certificate authority, wherein when the user selects the first type certificate authority in the selection screen, the output unit outputs the first type certificate signing request, and wherein when the user selects the second type certificate authority in the selection screen, the output unit outputs the second type certificate signing request.
- According thereto, by selecting one of the first and second type certificate authorities, the user can select the first or second type certificate signing request. In other words, the user can select one of the first and second type certificate signing requests based on the certificate authority that should make out a certificate. Thus, the user can easily image the options. Even if the user does not have sufficient knowledge about a difference between the first and second type certificate signing requests, the user can appropriately select one of the first and second type certificate signing requests.
- According to still another illustrative aspect of the invention, in the information processing apparatus, the preparation unit makes out both the first type certificate signing request and the second type certificate signing request based on the specific information, and wherein the display control unit displays the selection screen on the display unit after the preparation unit makes out both the first type certificate signing request and the second type certificate signing request.
- According thereto, after making out the first and second type certificate signing requests, the information processing apparatus can output the first or second type certificate signing request that is selected by the user. Therefore, compared to a configuration in which a user selects one of the first and second type certificate signing requests and then the one certificate signing request is made out and output, it is possible to shorten a time period from the user selection to the output of the certificate signing request.
- According to still another illustrative aspect of the invention, in the information processing apparatus, the preparation unit makes out both the first type certificate signing request and the second type certificate signing request in a memory, and wherein the preparation unit is configured to: delete the second type certificate signing request from the memory when the user selects for the first type certificate singing request in the selection screen; and delete the first type certificate signing request from the memory when the user selects for the second type certificate singing request in the selection screen.
- According thereto, the information processing apparatus can quickly delete the non-selected first or second certificate signing request of the prepared first and second certificate signing requests from the memory.
- According to still another illustrative aspect of the invention, in the information processing apparatus, the preparation unit makes out both the first type certificate signing request and the second type certificate signing request in a memory, and wherein the preparation unit is configured to delete the first type and second type certificate signing requests from the memory when a first certificate, which is made out based on the first type certificate signing request, or a second certificate, which is made out based on the second type certificate signing request, is installed into the information processing apparatus.
- According thereto, the information processing apparatus does not delete the first and second type certificate signing requests until the first or second certificate is installed in the information processing apparatus. Therefore, when a certificate authority does not make out a certificate based on the one certificate signing request that is selected according to the selection screen and the user wants the certificate authority to make out a certificate based on the other certificate signing request, for example, the user can acquire the other certificate signing request from the information processing apparatus without enabling the information processing apparatus to re-prepare the other certificate signing request.
- According to Still another illustrative aspect of the invention, in the information processing apparatus, the preparation unit is configured to: make out the first type certificate signing request without making out the second type certificate signing request when the user selects for the first type certificate signing request in the selection screen; and make out the second type certificate signing request without making out the first type certificate signing request when the user selects for the second type certificate signing request in the selection screen.
- According thereto, the information processing apparatus makes out only one certificate signing request that is selected by the user. The information processing apparatus does not have to prepare a certificate signing request that is not selected by the user. Thus, it is possible to reduce the resource burden of the information processing apparatus (for example, burden of the preparing process and burden of the memory).
- According to still another illustrative aspect of the invention, in the information processing apparatus, the preparation unit is further configured to: when the user selects for the first type certificate signing request, make out a first secret key and a first public key and make out the first type certificate signing request including the first public key; and when the user selects for the second type certificate singing request, make out a second secret key and a second public key and make out the second type certificate signing request including the second public key.
- According to still another illustrative aspect of the invention, the information processing apparatus further comprises a memory control unit that is configured to: associate and store a first certificate and the first secret key in the memory when the first certificate, which is made out based on the first type certificate signing request, is installed in the information processing apparatus; and associate and store a second certificate and the second secret key in the memory when the second certificate, which is made out based on the second type certificate signing request, is installed in the information processing apparatus.
- According thereto, the information processing apparatus can use the installed certificate to communicate with another device.
- According to still another illustrative aspect of the invention, the preparation unit is configured to: delete the second secret key from the memory, when the first certificate is installed in the information processing apparatus; and delete the first secret key from the memory, when the first certificate is installed in the information processing apparatus.
- Incidentally, a control method for the above-described information processing apparatus, a method of preparing a certificate signing request, a computer program for the above-described information processing apparatus and a non-transitory computer-readable medium which stores the computer program are also novel and useful.
- Exemplary embodiments of the invention will now be described with reference to the drawings.
- (System Configuration)
- A first exemplary embodiment will be described with reference to the drawings. As shown in
FIG. 1 , an information processing system 1 includes a LAN 4, an Internet 6, a multi-function device 10 (a peripheral apparatus of a terminal apparatus 60), aterminal apparatus 60 and 70, 80. Thecertificate authorities multi-function device 10, theterminal apparatus 60 and thecertificate authority 70 are connected to the LAN 4. Themulti-function device 10, theterminal apparatus 60 and thecertificate authority 70 can communicate with each other via the LAN 4. The LAN 4 and thecertificate authority 80 are connected to the Internet 6. Theterminal apparatus 60 and thecertificate authority 80 can communicate with each other via the LAN 4 and the Internet 6. - (Configuration of Multi-function Device 10)
- A configuration of the
multi-function device 10 will be described. Themulti-function device 10 includes a printing function, a scanner function, a copier function, an IPFAX function, electronic mail transmitting and receiving functions and the like. Themulti-function device 10 includes adisplay unit 12, anoperation unit 14, anetwork interface 16, ascan execution unit 18, aprinting execution unit 20 and acontrol unit 22. Therespective units 12 to 22 are connected to abus line 24. Thedisplay unit 12 is a display for displaying a variety of information. Theoperation unit 14 has a plurality of keys. A user can operate theoperation unit 14 to input various instructions to themulti-function device 10. Thenetwork interface 16 is connected to the LAN 4. Thescan execution unit 18 has a scan mechanism such as CIS, CCD and the like and scans a scan target to generate image data. Theprinting execution unit 20 has a printing mechanism of an inkjet head manner, a laser manner and the like and performs a printing operation in response to an instruction from thecontrol unit 22. Thecontrol unit 22 includes aCPU 30 and amemory 32. Thememory 32 includes aROM 34, a VRAM (volatile memory) 36 and an NVRAM (non-volatile memory) 38. TheROM 34 stores therein aprogram 35. TheCPU 30 executes a process in accordance with theprogram 35 in theROM 34. TheCPU 30 executes a process in accordance with theprogram 35 so as to implement the functions of 40, 42, 44, 46 and 48.respective units - (Configuration of Terminal Apparatus 60)
- The
terminal apparatus 60 is a personal computer and the like, for example. Theterminal apparatus 60 is connected to the LAN 4. Theterminal apparatus 60 includes adisplay unit 62, anoperation unit 64, anetwork interface 65 and acontrol unit 66. The respective units are connected to abus line 61. Thedisplay unit 62 is a display for displaying a variety of information. Theoperation unit 64 includes a keyboard, a mouse, and the like. Thenetwork interface 65 is connected to the LAN 4. Thecontrol unit 66 includes aCPU 67 and amemory 68. - (Configuration of
Certificate Authorities 70, 80) - The
70, 80 are authorities that make out a certificate in response to a certificate signing request (hereinafter, referred to as ‘CSR’) made by thecertificate authorities multi-function device 10. The CSR is classified into: a first type CSR including a basic area and extensions; and a second type CSR that includes a basic area but does not include extensions. In the basic area, various information of a certificate user such as common name, organization, department, city, province, country and the like (hereinafter, referred to as ‘basic area information’) are described. In the extensions, a variety of information such as ‘extended key usage (ExtendedKeyUsage)=email protection (emailProtection)’, ‘subject alternative name (SubjectAltName)=IPv4 address (IPv4addresss)’ and the like are described. The ‘extended key usage’, the ‘subject alternative name’ and the like are item names of the information that is described in the extensions. In addition, the ‘email protection’, the ‘IPv4 address’ and the like are item contents. The first CSR is a CSR for making out a certificate of version 3 of an x509 format (hereinafter, referred to as ‘CSR of x509v3’), for example. The second type CSR is a CSR for making out a certificate of version 1 of the x509 format (hereinafter, referred to as ‘CSR of x509v1’), for example. Thecertificate authority 70 makes out a certificate including extensions based on the first type CSR including extensions. In addition, thecertificate authority 70 can make out a certificate not including extensions based on the second type CSR that does not include extensions. On the other hand, thecertificate authority 80 can make out a certificate not including extensions based on the second type CSR, but thecertificate authority 80 cannot make out a certificate based on the first type CSR including the extensions. In the followings, thecertificate authority 70 and thecertificate authority 80 having the above characteristics are sometimes referred to as ‘Private certificate authority 70’ and ‘Public certificate authority 80’, respectively. Here, the Private certificate authority means an authority that can make out a certificate, only based on a CSR that themulti-function device 10 prepares in accordance with an application of themulti-function device 10. ThePublic certificate authority 80 means an enterprise, a public institution and the like that makes out a certificate. In this exemplary embodiment, the IPv4 address is adopted as an IP address. However, the IP address is not limited to the IPv4 address. For example, an IPv6 address may be adopted. - (Process executed by Multi-function Device 10)
- In the followings, a process that is executed by the
control unit 22 of themulti-function device 10 will be described with reference toFIGS. 2 to 5 . - A user can use the
operation unit 64 of theterminal apparatus 60 to access the web server installed on themulti-function device 10. When the user performs an operation for displaying a certificate setting screen (not shown), a display control unit 44 (refer toFIG. 1 ) transmits data, which indicates the certificate setting screen, to theterminal apparatus 60. As a result, theterminal apparatus 60 displays the certificate setting screen on thedisplay unit 62. The certificate setting screen is a screen for making a variety of settings relating to a certificate. The certificate setting screen has a first hyperlink for displaying a CSR preparation screen (refer toFIG. 3 ) and a second hyperlink screen for displaying an install screen (not shown). The user can use theoperation unit 64 to operate the first hyperlink, thereby performing an operation for displaying the CSR preparation screen (refer toFIG. 3 ). In addition, the user can use theoperation unit 64 to operate the second hyperlink, thereby performing an operation for displaying the install screen. The install screen is a screen that enables the user to perform an install operation for installing a certificate acquired from the certificate authority in themulti-function device 10, which will be described later. - (CSR Preparing Process)
- Referring to
FIG. 2 , a CSR preparing process will be described. When a user performs an operation for displaying the CSR preparation screen, the display control unit 44 (refer toFIG. 1 ) transmits data, which indicates a CSR preparation screen 100 (refer toFIG. 3 ), to theterminal apparatus 60. As a result, theCSR preparation screen 100 is displayed on thedisplay unit 62 of the terminal apparatus 60 (S2 inFIG. 2 ). - As shown in
FIG. 3 , theCSR preparation screen 100 includes aninput unit 102, aselection unit 104 and anOK button 106. Theinput unit 102 hasinput columns 102 a to 102 f of each information of common name, organization, department, city, province and country. The information that should be input in theinput columns 102 a to 102 f is the basic area information. Theselection unit 104 has 104 a, 104 b and anradio buttons input column 104 c. Theradio button 104 a (automatic) is a button for selecting that the IPv4 address of themulti-function device 10 will be used as a subject alternative name (SubjectAltName) that can be included in extensions. Theradio button 104 b (manual) is a button for selecting that a character string input in theinput column 104 c will be used as an alias name of a certificate. The user can check any one of the 104 a, 104 b. The user can operate theradio buttons operation unit 64 to input specific information in theinput columns 102 a to 102 f, to check any one of the 104 a, 104 b and to operate theradio button OK button 106. When theOK button 106 is operated at a state in which the specific information is input in theinput columns 102 a to 102 f and any one of the 104 a, 104 b is checked, theradio buttons control unit 66 of theterminal apparatus 60 transmits the basic area information, which is input in theinput columns 102 a to 102 f, the check information, which indicates that any one of the 104 a, 104 b is checked, and the character string, which is input in theradio buttons input column 104 c, to themulti-function device 10. - An acquiring unit 40 (refer to
FIG. 1 ) monitors whether the information transmitted from theterminal apparatus 60 is received (S4). The acquiring unit 40 (refer toFIG. 1 ) receives and acquires the information from theterminal apparatus 60, wherein the information includes the basic area information, the check information and the character string input in theinput column 104 c. When the acquiringunit 40 acquires the information (YES in S4), a preparation unit 42 (refer toFIG. 1 ) makes out a key pair for a first type CSR (S6). Specifically, in S6, thepreparation unit 42 makes out a first public key that should be included in a first type CSR and a first secret key that corresponds to the first public key. Then, thepreparation unit 42 makes out a first type CSR by using the basic area information, the check information, the character string input in theinput column 104 c and the first public key (S8). Specifically, in S8, thepreparation unit 42 prepares a basic area including the basic area information and the first public key. In addition, thepreparation unit 42 acquires information that should be included in extensions from theprogram 35. Specifically, when the check information indicates that theradio button 104 a is checked, thepreparation unit 42 acquires, as the ‘subject alternative name (SubjectAltName)=IPv4 address (IPv4address) of multi-function device 10’ that should be included in extensions, the name of the subject alternative name (SubjectAltName) and the IPv4 address that is set in themulti-function device 10 from theprogram 35. On the other hand, when the check information indicates that theradio button 104 b is checked, thepreparation unit 42 further acquires, as the item name of the information that should be included in extensions, the ‘subject alternative name (SubjectAltName)’ from theprogram 35 and acquires as the item content, the character string input in the input column 114 c. Thepreparation unit 42 makes out extensions including the acquired information. Although specifically not described in this exemplary embodiment, the information that should be included in the extensions is not limited to the subject alternative name (SubjectAltName). For example, the information that should be included in the extensions may include the extended key usage (ExtendedKeyUsage) and the like. Further, the information that should be included in the extensions may include the other information, instead of including the subject alternative name (SubjectAltName). Theselection unit 104 of the extensions setting of theCSR preparation screen 100 may be provided with the other check column or input column in addition to therespective columns 104 a to 104 c or instead of therespective columns 104 a to 104 c. The information that should be included in the extensions may any one of a preset value that is acquired from theprogram 35 and a value that is set by a user. In other words, the information that should be included in the extensions is generated by the information that is input from theCSR preparation screen 100 by the CSR preparing process and the information that is acquired from theprogram 35. Thepreparation unit 42 makes out a first type CSR by combining the prepared basic area information and extensions. When thepreparation unit 42 makes out the first type CSR, thepreparation unit 42 saves the first type CSR and the first secret key in the VRAM 36 (S10). - Then, the
preparation unit 42 makes out a key pair for a second type CSR (S12). Specifically, thepreparation unit 42 makes out a second public key and a second secret key. Then, thepreparation unit 42 makes out a second type CSR by using the basic area information and the second public key (S14). Specifically, in S14, thepreparation unit 42 makes out a basic area including the basic area information and the second public key, thereby preparing a second type CSR. As described above, the second type CSR does not include extensions. When thepreparation unit 42 makes out the second type CSR, thepreparation unit 42 stores the second type CSR and the second secret key in the VRAM 36 (S16). Accordingly, at this time, as shown inFIG. 5( a), theVRAM 36 stores information, in which the first type CSR and the first secret key are associated with each other, and information, in which the second type CSR and the second secret key are associated with each other. Then, thedisplay control unit 44 transmits data, which indicates a CSR selection screen 110 (refer toFIG. 4) , to theterminal apparatus 60. As a result, theCSR selection screen 110 is displayed on thedisplay unit 62 of the terminal apparatus 60 (S18 inFIG. 2 ). - As shown in
FIG. 4 , theCSR selection screen 110 includes: a message to prompt the user to select a certificate authority; aradio button 112 for selecting the Public certificate authority 80 (refer toFIG. 1 ); aradio button 114 for selecting the Private certificate authority 70 (refer toFIG. 1 ); and anOK button 116. The user can use theoperation unit 64 to check one of the 112, 114 and to operate theradio buttons OK button 116. When the user checks theradio button 112, it means that the user selects, as a certificate authority for preparing a certificate by using a CSR, thePublic certificate authority 80. In other words, it means that the user selects the preparation of the second type CSR. On the other hand, when the user checks theradio button 114, it means that the user selects, as a certificate authority for preparing a certificate by using a CSR, thePrivate certificate authority 70. As described above, thePrivate certificate authority 70 can make out a certificate based on both the first type CSR and the second type CSR. However, in this exemplary embodiment, when the user checks theradio button 114, it means that the user selects the first type CSR. In this exemplary embodiment, the user can select any one of thePublic certificate authority 80 and thePrivate certificate authority 70 in accordance with theCSR selection screen 110, thereby selecting any one of the first type CSR and the second type CSR. When the user operates theOK button 116, thecontrol unit 66 of theterminal apparatus 60 transmits the selection result of the user to themulti-function device 10. - As described above, in this exemplary embodiment, the user can select any one of the first type CSR and the second type CSR based on the certificate authority that should prepare a certificate. Thus, the user can easily image the options. Even when the user does not have sufficient knowledge about a difference between the first and second type CSRs, the user can appropriately select one of the first and second type CSRs.
- The
preparation unit 42 determines whether the user selects the first type CSR (S20). Specifically, when the selection result from theterminal apparatus 60 indicates thePrivate certificate authority 70, thepreparation unit 42 determines YES in S20. On the other hand, when the selection result from theterminal apparatus 60 indicates thePublic certificate authority 80, thepreparation unit 42 determines NO in S20. When a result of the determination in S20 is YES, thepreparation unit 42 stores the first secret key, which is stored in theVRAM 36, in theNVRAM 38. Further, thepreparation unit 42 deletes the first secret key from the VRAM 36 (S21). Then, thepreparation unit 42 deletes the second type CSR and the second secret key from the VRAM 36 (S22). According to this configuration, themulti-function device 10 can rapidly delete the second type CSR and the second secret key from theVRAM 34. At the completion time of S22, as shown inFIG. 5( b), theVRAM 36 stores the first type CSR. In addition, theNVRAM 38 stores the first secret key. Then, an output unit 46 (refer toFIG. 1) transmits the first type CSR in theVRAM 36 to theterminal apparatus 60. As a result, the first type CSR is displayed on the display unit 62 (S24). The user can confirm the content of the first type CSR. When the user uses theoperation unit 64 to perform a predetermined operation, thecontrol unit 66 saves the first type CSR, which is displayed on thedisplay unit 62, in thememory 68 of theterminal apparatus 60. - When a result of the determination in S20 is NO, the
preparation unit 42 stores the second secret key, which is stored in theVRAM 36, in theNVRAM 38. Further, thepreparation unit 42 deletes the second secret key from the VRAM 36 (S25). Then, thepreparation unit 42 deletes the first type CSR and the first secret key from the VRAM 36 (S26). According to this configuration, themulti-function device 10 can rapidly delete the first type CSR and the first secret key from theVRAM 36. Then, theoutput unit 46 transmits the second type CSR in theVRAM 36 to theterminal apparatus 60. As a result, the second type CSR is displayed on the display unit 62 (S28). The user can confirm the content of the second type CSR. When the user uses theoperation unit 64 to perform a predetermined operation, thecontrol unit 66 saves the second type CSR, which is displayed on thedisplay unit 62, in thememory 68 of theterminal apparatus 60. - In this exemplary embodiment, before the user selects one of the first type CSR and the second type CSR, the first type CSR and the second type CSR have been already prepared. Accordingly, when the user performs the selection, the
multi-function device 10 can immediately transmit the first or second type CSR. Thus, compared to a configuration in which after a user selects one of the first type CSR and the second type CSR, the corresponding one CSR is prepared and output, it is possible to shorten a time period from the user selection to the transmission of the CSR. - (Process After CSR Preparing Process is Completed)
- The process of the
multi-function device 10 after the CSR preparing process is completed will be described. When the CSR preparing process (refer toFIG. 2 ) is completed, as shown inFIG. 5( c), a memory control unit 48 (refer toFIG. 1) deletes the first or second CSR, which has been transmitted to theterminal apparatus 60 in S24 or S28, from theVRAM 36. - The user can use the
operation unit 64 of theterminal apparatus 60 to perform an operation for designating a certificate authority. In this case, theterminal apparatus 60 transmits the CSR acquired from the multi-function device 10 (CSR that is saved in the memory 68) to a certificate authority that is designated by the user. - For example, when the
Private certificate authority 70 receives the first type CSR from theterminal apparatus 60, thePrivate certificate authority 70 makes out a first certificate including extensions based on the first type CSR and transmits the first certificate to theterminal apparatus 60. In addition, for example, when thePublic certificate authority 80 receives the second type CSR from theterminal apparatus 60, thePublic certificate authority 80 makes out a second certificate not including extensions based on the second type CSR and transmits the second certificate to theterminal apparatus 60. Incidentally, if the user selects thePublic certificate authority 80 even though the first type CSR is acquired, thePublic certificate authority 80 cannot make out a certificate based on the first type CSR. In this case, theterminal apparatus 60 cannot obtain a certificate. - When the
terminal apparatus 60 receives the first certificate from thePrivate certificate authority 70, theterminal apparatus 60 stores the first certificate in thememory 68. Then, as described above, the user can use theoperation unit 64 of theterminal apparatus 60 to execute an operation for displaying the install screen (not shown). When an operation for displaying the install screen is executed, thedisplay control unit 44 transmits data, which indicates the install screen, to theterminal apparatus 60. As a result the install screen is displayed on thedisplay unit 62 of theterminal apparatus 60. The user can use theoperation unit 64 of theterminal apparatus 60 to execute an install operation for installing the first certificate stored in thememory 68 into theNVRAM 38 of themulti-function device 10, in the install screen. In this case, thecontrol unit 66 of theterminal apparatus 60 transmits the first certificate to themulti-function device 10. As a result, as shown inFIG. 5( d), thememory control unit 48 of themulti-function device 10 associates and stores (installs) the first certificate and the first secret key in theNVRAM 38. Like the first certificate, when theterminal apparatus 60 receives the second certificate from thePublic certificate authority 80, theterminal apparatus 60 transmits the second certificate to themulti-function device 10. As a result, thememory control unit 48 of themulti-function device 10 associates and stores (installs) the second certificate and the second secret key in theNVRAM 38. - When the certificate and the secret key are installed in the
NVRAM 36, themulti-function device 10 can use the installed certificate to communicate with another device (not shown). - The
information processing system 2 of this exemplary embodiment has been described. In this exemplary embodiment, theCSR selection screen 110 shown inFIG. 4 enables the user to select one of the first and second type CSRs. When the user selects the first type CSR (YES in S20 ofFIG. 2 ), theoutput unit 46 transmits the first type CSR to the terminal apparatus 60 (S30). On the other hand, when the user selects the second type CSR (NO in S20), theoutput unit 46 transmits the second type CSR to the terminal apparatus 60 (S30). Accordingly, the user executes the operation of selecting one of the first type CSR and the second type CSR in accordance with theCSR selection screen 110, thereby easily acquiring the CSR. - The correspondence between the configuration of this exemplary embodiment and the configuration of the invention will be described. The
multi-function device 10 is one example of the ‘information processing apparatus.’ TheCSR selection screen 110 ofFIG. 4 is one example of the ‘selection screen.’ Thedisplay unit 62 of theterminal apparatus 60 is one example of the ‘display unit.’ The result YES in S20 ofFIG. 2 and the result NO in S20 are examples of the ‘first case’ and the ‘second case’, respectively. ThePrivate certificate authority 70 and thePublic certificate authority 80 are examples of the ‘first type certificate authority’ and the ‘second type certificate authority’, respectively. The basic area information that is acquired in S4 ofFIG. 2 , the information that should be included in the extensions and is acquired from theprogram 35 in S8 ofFIG. 2 and the character string that is input in theinput column 104 c (refer toFIG. 3 ) and is acquired in S4 ofFIG. 2 are examples of the ‘specific information.’ - A second exemplary embodiment of the present invention will be described. Incidentally, a detailed description common to the first exemplary embodiment will be omitted.
- (CSR Preparing Process)
- The differences between the second exemplary embodiment and the first exemplary embodiment are described with reference to
FIGS. 6 and 7 . S40 and S42 ofFIG. 6 are the same as S2 and S4 ofFIGS. 2 . S44 and S46 ofFIG. 6 are the same as S18 and S20 ofFIG. 2 . When the first type CSR is selected (YES in S46), thepreparation unit 42 makes out a key pair for the first type CSR (S48). Then, thepreparation unit 42 makes out the first type CSR (S50). The first type CSR and the first secret key are prepared in theVRAM 36. Then, thepreparation unit 42 stores the first secret key, which is stored in the,VRAM 36, in the NVRAM 38 (S52). In S52, thepreparation unit 42 further deletes the first secret key from theVRAM 36. At the completion time of S52, as shown inFIG. 7( a), theVRAM 36 stores the first type CSR. In addition, theNVRAM 38 stores the first secret key. Then, theoutput unit 46 transmits the first type CSR to theterminal apparatus 60. As a result, the first type CSR is displayed on the display unit 62 (S54). - Like the case where the first type CSR is selected, when the second type CSR is selected (NO in S46), the
preparation unit 42 makes out a key pair for the second type CSR (S56) and makes out the second type CSR (S58). Then, thepreparation unit 42 stores the second secret key in the NVRAM 38 (S60). Then, theoutput unit 46 transmits the second type CSR to theterminal apparatus 60. As a result, the second type CSR is displayed on the display unit 62 (S62). - (Process After CSR Preparing Process is Completed)
- The process of the
multi-function device 10 after the CSR preparing process is completed is the substantially same as the first exemplary embodiment. Accordingly, when the first type CSR is transmitted in S54 ofFIG. 6 , thememory control unit 48 deletes the first type CSR from theVRAM 36 as shown inFIG. 7( b). Like the first exemplary embodiment, the user can make a request for certificate preparation to acquire the first certificate, which is prepared on the basis of the first type CSR, or the second certificate, which is prepared on the basis of the second type CSR, so as to install the first certificate or the second certificate in themulti-function device 10. As shown inFIG. 7( c), for example, when the install operation of the first certificate is executed, thememory control unit 48 of themulti-function device 10 associates and stores the first certificate and the first secret key in theNVRAM 38. - In the second exemplary embodiment, the
multi-function device 10 makes out only one type CSR that is selected by the user. Themulti-function device 10 does not have to prepare a CSR that is not selected by the user. Thus, it is possible to reduce the resource processing burden of the multi-function device 10 (for example, burden of the preparation processing and the burden of the memory). In the second exemplary embodiment, the result YES in S46 ofFIG. 6 and the result NO in S46 are examples of the ‘first case’ and the ‘second case’, respectively. - A third exemplary embodiment of the present invention will be described.
- Incidentally, a detailed description common to the first exemplary embodiment will be omitted.
- (CSR Preparing Process)
- The differences between a third exemplary embodiment and the first exemplary embodiment are described with reference to
FIGS. 8 to 10 . In the third exemplary embodiment, when an operation of starting the CSR preparing process is executed, thecontrol unit 22 executes processes of S70 to S84 ofFIG. 8 . The processes of S70 to S84 are the substantially same as S2 to S16 ofFIG. 2 . However, in S78 of the third exemplary embodiment, thepreparation unit 42 saves the first type CSR and the first secret key in theNVRAM 38, differently from S10 ofFIG. 2 . Likewise, in S84 of the third exemplary embodiment, thepreparation unit 42 saves the second type CSR and the second secret key in theNVRAM 38, differently from S16 ofFIG. 2 . Accordingly, at the completion time of S84, as shown inFIG. 10( a), theNVRAM 38 stores the information in which the first type CSR and the first secret key are associated with each other and the information in which the second type CSR and the second secret key are associated with each other. - The processes of S86 and S88 are the same as S18 and S20 of
FIG. 2 . In addition, the processes of S90 and S92 are the same as S24 and S26 ofFIG. 2 . In the third exemplary embodiment, even when the CSR preparing process is ended, both the CSR, which is selected by the user, and the CSR, which is not selected by the user, are continuously saved in the NVRAM 38 (refer toFIG. 10( a)). - (CSR Deleting Process)
- A process after the CSR preparing process will be described. Like the first exemplary embodiment, the user makes a request for certificate preparation to acquire the first certificate, which is prepared on the basis of the first type CSR, or the second certificate, which is prepared on the basis of the second type CSR, so as to install the first certificate or the second certificate in the
multi-function device 10. For example, when the first certificate is installed in themulti-function device 10, as shown inFIG. 10( b), theNVRAM 38 stores the first certificate, the first type CSR, the first secret key, the second type CSR and the second secret key. - When the certificate is installed in the
NVRAM 38, a CSR deleting process ofFIG. 9 starts. The memory control unit 48 (refer toFIG. 1 ) specifies a public key that is included in the installed certificate (S100). Then, thememory control unit 48 determines whether the secret key corresponding to the public key specified in S100 (hereinafter, referred to as ‘specific secret key’) is in the NVRAM 38 (S102). When the specific secret key is in the NVRAM 38 (YES in S102), thememory control unit 48 determines whether the specific secret key is associated with the first type CSR (S104). For example, when the specific secret key is the first secret key, the memory control unit determines YES in S104. When the specific secret key is the second secret key, the memory control unit determines NO in S104. - When the specific secret key is the first secret key (YES in S104), the
preparation unit 42 deletes the second type CSR and the second secret key from the NVRAM 38 (S106). Then, the preparation wait 42 deletes the first type CSR from the NVRAM 38 (S108). When the step of S108 is completed, thememory control unit 48 associates and stores the installed certificate (i.e., first certificate) and the first secret key in theNVRAM 38. Accordingly, at the completion time of S108, theNVRAM 38 stores therein the first certificate and the first secret key with being associated with each other as shown inFIG. 10( c). - On the other hand, when the specific secret key is the second secret key (NO in S104), the
preparation unit 42 deletes the first type CSR and the first secret key from the NVRAM 38 (S110). Then, thepreparation unit 42 deletes the second type CSR from the NVRAM 38 (S112). When the step of S112 is completed, thememory control unit 48 associates and stores the installed certificate (i.e., second certificate) and the second secret key in theNVRAM 38. - When the step of S108 or S112 is completed, the
display control unit 44 transmits data, which indicates a screen showing that the install of the certificate has been completed, to the terminal apparatus 60 (S114). Thereby, the user can know that the install of the certificate has been completed. When the step of S114 is completed, the CSR deleting process is ended. On the other hand, when the specific secret key is not in the NVRAM 38 (NO in S102), thedisplay control unit 44 transmits data, which indicates a screen showing an error, to the terminal apparatus 60 (S116). When the step of S116 is completed, the CSR deleting process is ended. - As described above, in the third exemplary embodiment, as shown in S78 and S84 of
FIG. 8 , in the CSR preparing process, thepreparation unit 42 stores the information in which the first type CSR and the first secret key are associated with each other and the information in which the second type CSR and the second secret key are associated with each other in theNVRAM 38. Themulti-function device 10 does not delete the first and second type CSRs until the first or second certificate is installed in themulti-function device 10. For example, there is a possibility that the user will acquire the first type CSR from themulti-function device 10 and erroneously transmit the first type CSR to thePublic certificate authority 80. As described above, thePublic certificate authority 80 cannot make out a certificate based on the first type CSR. The user who knows that a certificate is not prepared based on the first type CSR may consider transmitting the second type CSR to thePublic certificate authority 80. In the third exemplary embodiment, the certificate setting screen further includes a third hyperlink for displaying the CSR selection screen (refer toFIG. 4 ). Accordingly, in the above situation, the user can use theoperation unit 64 of theterminal apparatus 60 to operate the third hyperlink in the certificate setting screen, thereby executing the operation for displaying the CSR selection screen (refer toFIG. 4 ). When the operation for displaying the CSR selection screen is executed, thecontrol unit 66 of theterminal apparatus 60 transmits a predetermined command to themulti-function device 10. In this case, thecontrol unit 22 of themulti-function device 10 performs the same processes as S86 to S92 ofFIG. 8 . In other words, thedisplay control unit 44 transmits the data, which indicates the CSR selection screen 110 (refer toFIG. 4 ), to theterminal apparatus 60. As a result, the CSR selection screen 110 (refer toFIG. 4 ) is displayed on thedisplay unit 62 of the terminal apparatus 60 (S86 inFIG. 8 ). The user can select the second type CSR (i.e., ‘Public’) in accordance with the CSR selection screen 110 (refer toFIG. 4 ), so that the user can acquire the second type CSR. In other words, the user can acquire the second type CSR from themulti-function device 10 without requiring themulti-function device 10 to prepare the second type CSR again. Incidentally, in the third exemplary embodiment, the result YES in S88 ofFIG. 8 and the result NO in S88 are examples of the ‘ first case’ and the ‘second case’, respectively. - Modifications to the above-described exemplary embodiments will be described.
- (1) A CSR of x509v3 including extensions may be the first type CSR, and a CSR of x509v3 including no information in extensions may be the second type CSR.
- (2) The output of the first type or second type CSR may be performed by an arbitrary method without being limited to the download to the memory of the
terminal apparatus 60. For example, the displayed CSR information may be designated by the user, and a content thereof may be copied and pasted to a text file so as to be saved. - (3) The
certificate authority 70 may be configured such that thecertificate authority 70 is unable to prepare a certificate based on the second type CSR. In other words, generally, the ‘first type certificate authority’ may be a certificate authority that can make out a certificate at least based on the first type CSR. In addition, the ‘second type certificate authority’ may be a certificate authority that cannot make out a certificate based on the first type CSR and can prepare a certificate based on the second type CSR. - (4) The respective information may be displayed on the
display unit 12 of themulti-function device 10. In this modified embodiment, thedisplay unit 12 of themulti-function device 10 is an example of the ‘display unit.’ - (5) In the above-described exemplary embodiments, the
multi-function device 10 has been exemplified. Alternative to themulti-function device 10, a PC, a server a printer, a scanner, a mobile terminal (PDA, mobile phone and the like) may be used. Each of the devices is included in the configuration of the ‘information processing system.’ - The specific exemplary embodiments of the invention have been described. However, the embodiments are exemplary and not to limit the scope of the invention. The technologies defined in the claims include the modified and changed examples to the exemplary embodiments.
- In addition, the technical elements described and shown in the specification and the drawings provide the technical usefulness independently or in combination and are not limited to a combination of the claims at the time of filing this application. Further, the technologies exemplified in the specification or drawings achieve the purposes at the same time and have a technical usefulness inasmuch as one purpose is realized.
Claims (12)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2010164825A JP5505160B2 (en) | 2010-07-22 | 2010-07-22 | Information processing apparatus and computer program |
| JP2010-164825 | 2010-07-22 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20120023327A1 true US20120023327A1 (en) | 2012-01-26 |
| US8539239B2 US8539239B2 (en) | 2013-09-17 |
Family
ID=45494517
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/185,923 Active 2031-12-13 US8539239B2 (en) | 2010-07-22 | 2011-07-19 | Information processing apparatus |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US8539239B2 (en) |
| JP (1) | JP5505160B2 (en) |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160028723A1 (en) * | 2013-06-14 | 2016-01-28 | Go Daddy Operating Company, LLC | Method for domain control validation |
| US20170063842A1 (en) * | 2015-08-24 | 2017-03-02 | Hyundai Motor Company | Method for controlling vehicle security access based on certificate |
| CN108462810A (en) * | 2017-02-17 | 2018-08-28 | 佳能株式会社 | Information processing unit, image forming apparatus, system and method and storage medium |
| US11119707B2 (en) * | 2019-08-28 | 2021-09-14 | Canon Kabushiki Kaisha | Printing apparatus, control method and storage medium to issue certificate signing request (CSR) and register the printing apparatus |
| US11165591B2 (en) * | 2016-09-08 | 2021-11-02 | Cable Television Laboratories, Inc. | System and method for a dynamic-PKI for a social certificate authority |
| US11323274B1 (en) | 2018-04-03 | 2022-05-03 | Amazon Technologies, Inc. | Certificate authority |
| US11424937B2 (en) | 2018-06-29 | 2022-08-23 | Canon Kabushiki Kaisha | Information processing apparatus, control method for information processing apparatus, and storage medium |
| US11563590B1 (en) | 2018-04-03 | 2023-01-24 | Amazon Technologies, Inc. | Certificate generation method |
| US11888997B1 (en) * | 2018-04-03 | 2024-01-30 | Amazon Technologies, Inc. | Certificate manager |
| US12034872B1 (en) * | 2021-08-25 | 2024-07-09 | Amazon Technologies, Inc. | Highly available certificate issuance using specialized certificate authorities |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP6320583B2 (en) * | 2017-02-13 | 2018-05-09 | キヤノン株式会社 | Image forming apparatus |
| WO2021077120A1 (en) * | 2019-10-18 | 2021-04-22 | Tbcasoft, Inc. | Distributed ledger-based methods and systems for certificate authentication |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050076205A1 (en) * | 2003-08-15 | 2005-04-07 | Imcentric, Inc. | Method of aggregating multiple certificate authority services |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4583833B2 (en) * | 2003-09-12 | 2010-11-17 | 株式会社リコー | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM |
| US8225096B2 (en) | 2006-10-27 | 2012-07-17 | International Business Machines Corporation | System, apparatus, method, and program product for authenticating communication partner using electronic certificate containing personal information |
-
2010
- 2010-07-22 JP JP2010164825A patent/JP5505160B2/en active Active
-
2011
- 2011-07-19 US US13/185,923 patent/US8539239B2/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050076205A1 (en) * | 2003-08-15 | 2005-04-07 | Imcentric, Inc. | Method of aggregating multiple certificate authority services |
Cited By (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9667618B2 (en) * | 2013-06-14 | 2017-05-30 | Go Daddy Operating Company, LLC | Method for domain control validation |
| US20160028723A1 (en) * | 2013-06-14 | 2016-01-28 | Go Daddy Operating Company, LLC | Method for domain control validation |
| US20170063842A1 (en) * | 2015-08-24 | 2017-03-02 | Hyundai Motor Company | Method for controlling vehicle security access based on certificate |
| US9954851B2 (en) * | 2015-08-24 | 2018-04-24 | Hyundai Motor Company | Method for controlling vehicle security access based on certificate |
| US11716207B1 (en) * | 2016-09-08 | 2023-08-01 | Cable Television Laboratories, Inc. | System and method for a dynamic-PKI for a social certificate authority |
| US11165591B2 (en) * | 2016-09-08 | 2021-11-02 | Cable Television Laboratories, Inc. | System and method for a dynamic-PKI for a social certificate authority |
| CN108462810A (en) * | 2017-02-17 | 2018-08-28 | 佳能株式会社 | Information processing unit, image forming apparatus, system and method and storage medium |
| GB2561948A (en) * | 2017-02-17 | 2018-10-31 | Canon Kk | Information processing apparatus, image forming apparatus, system, method of controlling the same, and storage medium |
| US12438735B2 (en) | 2017-02-17 | 2025-10-07 | Canon Kabushiki Kaisha | Information processing apparatus, method of controlling the same, and storage medium |
| US11212115B2 (en) | 2017-02-17 | 2021-12-28 | Canon Kabushiki Kaisha | Information processing apparatus, method of controlling the same, and storage medium |
| US11838430B2 (en) | 2017-02-17 | 2023-12-05 | Canon Kabushiki Kaisha | Information processing apparatus, method of controlling the same, and storage medium |
| US11888997B1 (en) * | 2018-04-03 | 2024-01-30 | Amazon Technologies, Inc. | Certificate manager |
| US11563590B1 (en) | 2018-04-03 | 2023-01-24 | Amazon Technologies, Inc. | Certificate generation method |
| US11323274B1 (en) | 2018-04-03 | 2022-05-03 | Amazon Technologies, Inc. | Certificate authority |
| US11997222B1 (en) | 2018-04-03 | 2024-05-28 | Amazon Technologies, Inc. | Certificate authority |
| US20220345319A1 (en) * | 2018-06-29 | 2022-10-27 | Canon Kabushiki Kaisha | Information processing apparatus, control method for information processing apparatus, and storage medium |
| US11424937B2 (en) | 2018-06-29 | 2022-08-23 | Canon Kabushiki Kaisha | Information processing apparatus, control method for information processing apparatus, and storage medium |
| US12445309B2 (en) * | 2018-06-29 | 2025-10-14 | Canon Kabushiki Kaisha | Information processing apparatus, control method for information processing apparatus, and storage medium |
| US11119707B2 (en) * | 2019-08-28 | 2021-09-14 | Canon Kabushiki Kaisha | Printing apparatus, control method and storage medium to issue certificate signing request (CSR) and register the printing apparatus |
| US12034872B1 (en) * | 2021-08-25 | 2024-07-09 | Amazon Technologies, Inc. | Highly available certificate issuance using specialized certificate authorities |
Also Published As
| Publication number | Publication date |
|---|---|
| US8539239B2 (en) | 2013-09-17 |
| JP2012028978A (en) | 2012-02-09 |
| JP5505160B2 (en) | 2014-05-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8539239B2 (en) | Information processing apparatus | |
| US9773127B2 (en) | Information processing apparatus | |
| US9509860B2 (en) | Function execution apparatus and screen information server | |
| JP5605054B2 (en) | Image formation support system and image formation support method | |
| CN104050024B (en) | Process flow definition creating system, process flow definition creating device, and a method of creating process flow definition | |
| CN102547019B (en) | Terminal installation, server, menu control method and screen transition method | |
| US9164710B2 (en) | Service providing system and service providing method | |
| JP5915278B2 (en) | Program, information processing apparatus, storage medium | |
| US11222109B2 (en) | Computer-readable medium and information processing device for reducing troublesome operations for authenticated access to cloud server | |
| US10180849B2 (en) | Apparatus, information processing system, information processing method, and computer program product | |
| JP6223099B2 (en) | Image processing apparatus, control method therefor, and program | |
| JP2019021972A (en) | Information input device, information processing system, program, and information processing method | |
| US20100058194A1 (en) | Remote Desktop on Multi-Function Peripheral | |
| US20150007279A1 (en) | Communication method, device, information processing apparatus, and storage medium | |
| JP2017019196A (en) | Information processing device, controlling method for information processing device, and program | |
| JP5634132B2 (en) | Information processing system, information processing apparatus, control method thereof, and program | |
| JP2016072839A (en) | Image reading device and computer program | |
| JP2017138883A (en) | Apparatus, control method therefor, and program | |
| US20180376015A1 (en) | Image forming apparatus with personalization function, control method therefor, and storage medium | |
| US9854110B2 (en) | Information processing system and information processing method | |
| US20120033258A1 (en) | Image processing apparatus, control method of image processing apparatus, and storage medium | |
| US9531905B2 (en) | Scanner that is capable of uploading scan data in a target area within a data storage server | |
| US11614904B2 (en) | Printing device, information processing device, and control method and medium for the same | |
| US20160072967A1 (en) | Information processor creating communication application, and computer-readable non-transitory recording medium storing application creation program for creating communication application | |
| JP6508246B2 (en) | Processing execution system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: BROTHER KOGYO KABUSHIKI KAISHA, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NAGASAKI, TAKESHI;REEL/FRAME:026614/0724 Effective date: 20110704 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FPAY | Fee payment |
Year of fee payment: 4 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |